CVE-2018-7755
kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
Se descubrió un fallo de seguridad en la función fd_locked_ioct en drivers/block/floppy.c en el kernel de Linux hasta la versión 4.15.7. La unidad de disquete copiará un puntero kernel a la memoria del usuario en respuesta a la llamada IOCTL FDGETPRM. Un atacante puede enviar la llamada IOCTL FDGETPRM y utilizar el puntero de kernel obtenido para descubrir la ubicación de los datos y el código del kernel y omitir medidas de seguridad de kernel como KASLR.
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-03-08 CVE Reserved
- 2018-03-08 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://lkml.org/lkml/2018/3/7/1116 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:2029 | 2018-10-04 | |
https://access.redhat.com/errata/RHSA-2019:2043 | 2018-10-04 | |
https://usn.ubuntu.com/3695-1 | 2018-10-04 | |
https://usn.ubuntu.com/3695-2 | 2018-10-04 | |
https://usn.ubuntu.com/3696-1 | 2018-10-04 | |
https://usn.ubuntu.com/3696-2 | 2018-10-04 | |
https://usn.ubuntu.com/3697-1 | 2018-10-04 | |
https://usn.ubuntu.com/3697-2 | 2018-10-04 | |
https://usn.ubuntu.com/3698-1 | 2018-10-04 | |
https://usn.ubuntu.com/3698-2 | 2018-10-04 | |
https://www.debian.org/security/2018/dsa-4308 | 2018-10-04 | |
https://access.redhat.com/security/cve/CVE-2018-7755 | 2019-08-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1553216 | 2019-08-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.15.7 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.15.7" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 17.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "17.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
|